Results 71 to 80 of about 4,930 (199)
Investigation of Blockchain for Cybersecurity in Maritime Autonomous Surface Ships
This study investigates the application of blockchain technology to enhance cybersecurity in Maritime Autonomous Surface Ships (MASS). By conducting a SWOT/TOWS analysis and survey, it highlights the potential to improve data integrity, transparency and trust in MASS operations.
Ian Hamilton +2 more
wiley +1 more source
Unmanned Aerial Vehicles (UAVs) are increasingly employed across various domains, including communication, military, and delivery operations. Their reliance on the Global Positioning System (GPS) renders them vulnerable to GPS spoofing attacks, in which ...
Abdallah Al-Sabbagh +4 more
doaj +1 more source
Security Challenges and Solutions in Self‐Driving Vehicles: A Comprehensive Review
This article presents a comprehensive review of cybersecurity challenges and solutions in self‐driving vehicles, focusing on threats across vehicular communication, sensors, artificial intelligence (AI) systems, and data privacy. It categorises attacks based on autonomous vehicle architecture layers and highlights advanced countermeasures such as AI ...
Yaw Opoku Mensah Sekyere +2 more
wiley +1 more source
In this work we introduce the concept of quantum geo-encryption - a protocol that invokes direct quantum encryption of messages coupled to quantum location monitoring of the intended receiver.
Malaney, Robert
core +1 more source
Tracking Loop Distortion of BDS‐3 B1C Signal in Spoofing Scenarios: An Experimental Analysis
This study established a feeder‐based BDS spoofing experimental platform and uses multi‐correlator tracking to systematically analyse the tracking loop distortion characteristics of BDS‐3 B1C signals under position and time spoofing, comparing differences between narrowband (NB) and wideband (WB) tracking modes.
Bo Jiao +4 more
wiley +1 more source
Galileo and EGNOS as an asset for UTM safety and security [PDF]
GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low ...
Andrade-Cetto, Juan +7 more
core
Tree-based Intelligent Intrusion Detection System in Internet of Vehicles
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail +3 more
core +1 more source
Attack Identification and Correction for PMU GPS Spoofing in Unbalanced Distribution Systems
Due to the vulnerability of civilian global positioning system (GPS) signals, the accuracy of phasor measurement units (PMUs) can be greatly compromised by GPS spoofing attacks (GSAs), which introduce phase shifts into true phase angle measurements. Focusing on simultaneous GSAs for multiple PMU locations, this paper proposes a novel identification and
Ying Zhang 0039 +2 more
openaire +2 more sources
Controlled Laboratory Evaluation of the Evolving GNSS RFI Threat Space
The work presented here presents the design, implementation and results produced by a novel hardware in the loop testing framework developed for global navigation satellite systems receiver testing under radiofrequency interference conditions. The simulation framework builds upon the world’s largest known database of multi‐frequency RFI events ...
Aiden J. Morrison +2 more
wiley +1 more source
GNSS Spoofing Detection Based on Ionospheric Model Deviation Monitoring
The deviation of TEC (DTEC) consistency between DF measurements and empirical model estimations in authentic scenarios is not zero but is predictable through ionospheric annual periodicity. However, DF spoofers typically struggle to accurately counterfeit the authentic TEC value, which can disrupt the consistency between DTEC measurements and ...
Xiaoxuan Xu +4 more
wiley +1 more source

